Static task
static1
Behavioral task
behavioral1
Sample
54f9a306881a58faad1e30c6f16daa02_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
54f9a306881a58faad1e30c6f16daa02_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
54f9a306881a58faad1e30c6f16daa02_JaffaCakes118
-
Size
206KB
-
MD5
54f9a306881a58faad1e30c6f16daa02
-
SHA1
c15f9137959bd833f72d1c1c757bf0ed32611071
-
SHA256
bb04b804199561fbd7a9224f225b6ee9b9aaf127ae3079c5302ba13244c4a56e
-
SHA512
431fcec5463c2d32eabf44d88d30e6c945c012faaea84806820899bd984a7b4ffcb08156407b8f60430334dcda0d60fd4b1358e25314741c73adbf1f4a0b2c13
-
SSDEEP
3072:Gx208wSHtzLtgluUSn4XYyCOtbvuP+xn0C1/30ByH7m9pkDZt6mGyj6v:A203SNzZFR4XBC2bumKCB3PHDt6PyA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 54f9a306881a58faad1e30c6f16daa02_JaffaCakes118
Files
-
54f9a306881a58faad1e30c6f16daa02_JaffaCakes118.exe windows:4 windows x86 arch:x86
d614ab4c32d6c0fa20de611c0a7c2665
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
Imports
kernel32
SetConsoleWindowInfo
SetConsoleScreenBufferSize
GetLargestConsoleWindowSize
Beep
ExitProcess
GetEnvironmentStrings
GetStartupInfoA
GetCommandLineA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
VirtualAlloc
VirtualFree
HeapAlloc
GetProcessHeap
HeapFree
HeapSize
CreateEventA
GetCurrentThreadId
ResumeThread
CreateThread
GetFullPathNameA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetFileAttributesA
SetFileAttributesA
CreateFileA
ReadFile
DeviceIoControl
FindClose
FindFirstFileA
GetFileTime
SetFileTime
CopyFileA
SetFilePointer
SetLastError
GetConsoleScreenBufferInfo
SetEndOfFile
DeleteFileA
GetExitCodeProcess
CreateProcessA
FreeEnvironmentStringsA
CreateDirectoryA
GetSystemDirectoryA
GetTempPathA
GetTempFileNameA
SetConsoleTitleA
GetConsoleTitleA
GetSystemTime
GetLocalTime
GetTimeZoneInformation
FindNextFileA
SetErrorMode
GetWindowsDirectoryA
MultiByteToWideChar
CreateSemaphoreA
ExpandEnvironmentStringsA
GetUserDefaultLangID
MulDiv
CreateFileMappingA
MapViewOfFile
GetCurrentProcess
GetSystemInfo
IsBadReadPtr
GetStdHandle
WriteFile
WaitForSingleObject
GetCurrentProcessId
SetEvent
CloseHandle
UnmapViewOfFile
GetVersion
GetModuleFileNameA
Sleep
GetTickCount
GetEnvironmentVariableA
GetModuleHandleA
LoadLibraryA
GetProcAddress
FreeLibrary
GetLastError
GetFileSize
user32
DialogBoxIndirectParamA
SetCursor
FindWindowA
wsprintfA
DestroyWindow
UpdateWindow
CreateDialogIndirectParamA
SystemParametersInfoA
ScreenToClient
DispatchMessageA
TranslateMessage
TranslateAcceleratorA
TranslateMDISysAccel
GetClassInfoA
DefWindowProcA
DefMDIChildProcA
ReleaseCapture
SetCapture
GetParent
WindowFromPoint
GetCursorPos
DrawTextA
GetClassLongA
PtInRect
GetWindowRect
GetWindow
IsWindow
EnumChildWindows
GetMessageA
LoadBitmapA
LoadAcceleratorsA
InsertMenuA
CreateMenu
DestroyMenu
GetSubMenu
WinHelpA
EndDialog
SetFocus
MessageBoxA
GetSystemMetrics
SetWindowPos
SetTimer
LoadCursorA
RegisterClassA
GetWindowLongA
SetWindowLongA
SetActiveWindow
LoadIconA
GetKeyState
IsIconic
ShowWindow
KillTimer
GetWindowPlacement
PostQuitMessage
SetWindowPlacement
CreateWindowExA
MoveWindow
SendMessageA
FillRect
InvalidateRect
BeginPaint
GetClientRect
EndPaint
GetDesktopWindow
ReleaseDC
GetDC
gdi32
MoveToEx
CreateBrushIndirect
SetBkColor
GetObjectA
TextOutA
SetTextColor
DeleteDC
LineTo
CreateCompatibleDC
CreateFontA
CreatePen
SelectObject
GetTextExtentPointA
DeleteObject
GetDeviceCaps
CreateFontIndirectA
BitBlt
GetStockObject
advapi32
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
Sections
.text Size: 168KB - Virtual size: 167KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ